Challenges in Deep Learning-Based Profiled Side-Channel Analysis

In recent years, profiled side-channel attacks based on machine learning proved to be very successful in breaking cryptographic implementations in various settings. Still, despite successful attacks even in the presence of countermeasures, there are many open questions. A large part of the research concentrates on improving the performance of attacks while little is done to understand them and even more importantly, use that knowledge in the design of more secure implementations. In this paper, we start by briefly recollecting on the state-of-the-art in machine learning-based side-channel analysis. Afterward, we discuss several challenges we believe will play an important role in future research.

[1]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[2]  Emmanuel Prouff,et al.  Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.

[3]  Lilian Bossuet,et al.  Methodology for Efficient CNN Architectures in Profiling Attacks , 2019, IACR Cryptol. ePrint Arch..

[4]  Stjepan Picek,et al.  Bias-variance Decomposition in Machine Learning-based Side-channel Analysis , 2019, IACR Cryptol. ePrint Arch..

[5]  Axel Legay,et al.  On the Performance of Convolutional Neural Networks for Side-Channel Analysis , 2018, SPACE.

[6]  Olivier Markowitch,et al.  A Machine Learning Approach Against a Masked AES , 2013, CARDIS.

[7]  Annelie Heuser,et al.  Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis , 2019, IACR Cryptol. ePrint Arch..

[8]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[9]  Alan Hanjalic,et al.  Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis , 2019, IACR Cryptol. ePrint Arch..

[10]  Cécile Canovas,et al.  Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.

[11]  Sylvain Guilley,et al.  Profiling Side-channel Analysis in the Restricted Attacker Framework , 2019, IACR Cryptol. ePrint Arch..

[12]  Christof Paar,et al.  A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.

[13]  Sylvain Guilley,et al.  Template attack versus Bayes classifier , 2017, Journal of Cryptographic Engineering.

[14]  Máire O'Neill,et al.  Neural network based attack on a masked implementation of AES , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[15]  Annelie Heuser,et al.  The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..

[16]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[17]  Cécile Canovas,et al.  A Comprehensive Study of Deep Learning for Side-Channel Analysis , 2019, IACR Cryptol. ePrint Arch..

[18]  Shreyas Sen,et al.  X-DeepSCA: Cross-Device Deep Learning Side Channel Attack* , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).

[19]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[20]  Olivier Markowitch,et al.  A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.

[21]  Markus G. Kuhn,et al.  Efficient Template Attacks , 2013, CARDIS.

[22]  Zdenek Martinasek,et al.  Innovative Method of the Power Analysis , 2013 .